Premium Essay

Network Paper

In: Other Topics

Submitted By doniel24
Words 651
Pages 3
Network Management Systems
Doniel Lovely
NetW420: Enterprise Network Management
Professor: Winston Park
Devry University
Date: 6/23/2013

Effectiveness and efficiency can at the same time or simultaneously perform at high standards in any given business organization. While effectiveness refers to the levels at which any organization realizes its goals through managing to accomplish set tasks, efficiency is highly related to the magnitude of resources utilized to achieve these goals of the organization. (Daft and Lane, 2008) This is a report set to answer the question, “Which are the various metrics used to measure the effectiveness and efficiency of a network in pursuit of organizational goals?” The report will answer in a detailed manner this aforementioned question.
In PERT, the requirement is that each activity should be provided with three kinds of estimates. These are: Optimistic, Pessimistic and most likely times. Under the PERT procedure, the optimistic time denotes the shortest duration an activity can take to complete (pert.com, 2013). Commonly, to determine the Optimistic time three standard deviations are utilized to reduce the level of error in calculating the times. Pessimistic time on the other hand is the longest duration an activity may take to finish. Also, here three standard deviations are applied from the expected time.
The Most likely time is the highest probability that an activity will be through in a given set time. However, this is not the same as the expected time of completion. Therefore, using the three types of estimates, expected time can be computed. This is because PERT, during the time estimation, takes an assumption of beta probability. Thus, the formula below indicates the weighted average to calculate the expected time duration. Take to denote expected time.
An activity in the real life setting may not be a continuous…...

Similar Documents

Premium Essay

Kudler Fine Foods Network Topology Paper

...Integrative Network Design Project James Warren NTC/362 July 30, 2012 Andrew Carpenter Integrative Network Design Project This paper will discuss Kudler Fine Foods desire to upgrade their current outdated infrastructure with current technology that will let them stay competitive in today’s market. In order to do this they will need to tie all three of their existing sites together using wireless and VOIP technology. Distributed Computing Currently all three of the Kudlers facilities utilizes a distributed computing system using the same configuration of single server and multiple pc’s, each with a single UPS and 56k modem for connectivity. The computers are connected to an Ethernet backbone (typically a hub that is not very efficient in handling network traffic for many computers) and the 56k modem is the only external connectivity that the sites have. Centralized Computing In order to bring this system up to standards they will need to update to a more centralized computing system which all computing is done on a centrally managed computer system and the users use a dumb terminal (thin client) to connect to these central computers. The cost associated with this has been reduced over the years and was only used previously in enterprise environments but now more businesses are moving over to this type of system. Network Topologies Kudlers three offices use almost identical setups for their servers, POS systems and their site connectivity. They......

Words: 747 - Pages: 3

Premium Essay

Network Topology Paper Assignment 1 Unit 3

...Network Topology Paper Assignment 1 Unit 3 Mr. Swailes The study of Network Topology recognizes 8 basic topologies * Point to point * Star * Bus * Mesh * Tree * Hybrid * Daisy chain * Ring Point to point- The simplest topology is the permanent link between two end points Star-in a local area network with a star topology. Each network host is connected to a central hub with a point-to-point connection to a central node called a hub or switch. Bus- In local area networks where Bus Topology is used, each computer is connected to a single Bus cable. A signal from the source travels in both directions to all machines connected on the Bus cable until it finds the intended recipient. If the machine address does not match the intended address for the data, the machine ignores it. However, if the data matches it is accepted. The bad part of this topology is that it has a single point of failure which is the cable and if this happens the whole network can shut down. Mesh-is a fully connected network in which each node is connected to each other. A fully connected network does not need to use switching or broadcasting. However its major disadvantage is that the number of connections grows with the number of nodes. It is extremely impractical for large networks. A two node network is technically a fully connected network. Tree-is a combination of a Bus and Star topology. It is arranged to look like a tree. The advantages are it is......

Words: 641 - Pages: 3

Premium Essay

Unit 3. Assignment 1. Network Topology Paper

...Unit 3. Assignment 1. Network Topology Paper Hierarchical layout defines how the network topology is structured physically and logically. In physical topology all devices and components are placed in various locations depending on the layout. Logical topology is the flow of data throughout the layout. There are many variations of network topologies that can be implemented. The most common network topologies are star, bus, and ring. Star topology is setup with each host connected to a central hub with a point to point connection. All workstation and other devices are connected to the central hub or switch. That switch is the server and all devices connected to it are clients. All resources must be connected to a central device in order for it to be a star topology. Data that travels in the network passes through the central hub and causes it to act as a signal repeater. The advantages of a star topology are that it is easy to design and versatile in planting additional nodes. The major disadvantage of the star topology is that the hub becomes the single point of failure. Bus topology utilizes a single bus cable to connect each computer and the data from the source travels in both directions to all devices on the bus cable until it finds the specific client. Data is only accepted if the addresses matched up and if it doesn’t match, it’s simply ignored. The last computer connected to the bus needs to be terminated to prevent echoes in the network. Having a single line for......

Words: 396 - Pages: 2

Premium Essay

Mobile Computing and Social Networks Term Paper

...Mobile Computing and Social Networks. Abstract Mobile computing has rapidly evolved for the last two decades with the use of wireless technology making the location irrelevant and increasing the opportunities for business to streamline business processes, reduce operational processing times and provide better customer service. Mobile revolution has also forced many industries to reengineer their business processes to accommodate the many mobile devices. Mobile computing and social networks are part of the daily lives of millions of Americans. 42% of American adults own a mobile and tablet computing device. “Additional research shows that about three quarters of U.S. adults are online, with about 66% of them using social networking sites” (Brenner, 2012). Specific methods for how IT departments and mobile app developers and designers can decide on supporting different mobile platforms like the Apple iPhone, Apple iPad, Windows Phone, or Android supported smartphones and tablets will be discussed. Other topics addressed in this paper include the issue of “high availability” for mobile app users’ Based on these considerations organizations and businesses are nowadays focusing on the implementation of these applications, while replacing their desktop platforms to the mobile devices (Shih, et.al. n.d). “On the other hand, it is also observed that, these applications may also enhance various risks and vulnerabilities,...

Words: 4537 - Pages: 19

Premium Essay

Network Design Paper

...developed for the Denver and the Houston region. XUMUC has been given the 172.16.0.0 network. Considerations and Questions In planning for this network, I was faced with many questions on how to apply the learned material to the network. How do I allocate IP addresses for the current network and for the preparation for network growth? Which routing protocol should I use? Does the routing protocol need to be Cisco proprietary or open standard? How stringent must the network security be? Does the network need contingency plans in place? The network had to be designed as broad as possible without falling for the allure of tending to every minute detail such as creating access lists and security measures such as TACACS or AAA. Assumptions include sharing the number of hosts between the San Francisco routers. I evenly allocated 430 IP addresses for each of the San Francisco routers. I also created 5 VLANs for the 4 departments and for management. I also kept network security limited to access lists with stringent security at the summarization points and for the routers connecting to those points. Part I: Designing the IP addressing scheme based on network specifications Figure 1 shows the 3 subnetworks designed for the infrastructure. Summarization points are located at the Denver Campus router from SF1 router and at the Houston1 router from the SF2 router. I also wanted to keep the networks summarized to allow for expansion to allow for additional hosts. I also......

Words: 1015 - Pages: 5

Premium Essay

Network Topology Paper

... Lee Sr. NT1310 Week 3 Assignment.Network Topology Paper Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network.[1][2] Essentially, it is the topological[3] structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical. A good example is a local area network (LAN): Any given node in the LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network. Conversely, mapping the data flow between the components determines the logical topology of the network. Contents * 1 Topology * 1.1 Point-to-point * 1.2 Bus * 1.3 Star * 1.4 Ring * 1.5 Mesh * 1.6 Tree * 1.6.1 Advantages * 1.6.2 Disadvantages * 1.7 Hybrid * 1.8 Daisy chain * 2 Centralization * 3 Decentralization * 4 See also * 5 References * 6 External links Topology There are two basic categories of network topologies:[4] 1. Physical topologies 2.......

Words: 5057 - Pages: 21

Free Essay

Unit 6 Research Paper Network Attached Storage

...Jonathan Bowden October 27, 2014 NT1114 Unit 6 Research Paper Network Attached Storage A Network Attached Storage device is like having an at-home cloud. It allows all the computers in a household to access the same massive storage device. Since NAS devices start at 2 TB of data, they can hold everything your family is going to need. If a single computer gets damaged and you are using a NAS device, you don’t have to worry about all of your data being lost. The computer is broken, but all of your home videos and pictures are safe and sound on your NAS device. There really are no limits to Network Attached Storage. With 1 GB Ethernet you can transmit just about everything you want as fast as you’re going to need it. You could also use a 10GB fiber optic cable too if you really wanted to. I guess the only real limit would be on a wireless network where you would be limited to the speed of your wi-fi connection. The capacity range of a NAS device is really only limited to the size of hard drives. A board with six SATA ports can be replicated to allow for 30 drives to be attached, if 3 TB drives are used in RAID 50 that would be 72 TB of storage, or approximately 72,000 full length movies. So you are going to be able to put as much memory on the NAS device as you’re going to need. It will only be a matter of cost that will limit you. And since RAID is very stable, there’s nothing really to be afraid of using this kind of storage. As for whether or not a......

Words: 401 - Pages: 2

Premium Essay

Social Network Final Paper

... 2 Today’s society has involved the technology and have made ways communication easier with a thing called social networking. Social networking is a way to communicate with family and friends. Technology has improved over the years and with its improvement and advances we have advanced with technology. Social networking can provide good points and bad points, it’s all in the perception of social networking. Some may say social networking is a gateway to exposure and privacy will be compromise. Others may say social networking is the new way of life and is the best way of communication. Everyone needs to use caution when engaging on a social network site. Web 2.0 was introduced in 2004 it is the interactive side of a webpage so that users can pose their own, comments content and information. Web 2.0 was said to provide a forum for everyone to share their voice and ideas with the world Web 2.0 is a collaboration of revolutionary because it brings people together into online communities that are an impossibility. (07CH_Bowles_Digtal.pdf). Blog is a term that comes from the word web-long, but because we are always shortening and like to give words or idea a catchy sound or name, it is known as blog. There are millions of blogs today. Today people create blogs to give an informational account of their daily lives and some blogs serve an informative way to communicate to......

Words: 1745 - Pages: 7

Free Essay

Ntc/411 Network Management Paper

...Network Management (Your Name) NTC/411 (Current Date) (Instructor’s Name) Network Management Network management is an integral part of any IT system. Managing a network can be a tough task at times and managers have to decide on the best approaches for their network management. In this paper we’ll discuss out-of-band vs. in-band network management. We’ll also provide some examples of some of the protocols that perform in both types of network management and how enterprise systems are affected by the network management techniques along with business intelligence systems. In general, in-band and out-of-band refer to whether the solution or technique sits in the flow of the network traffic or out of the flow. Some IT professionals say that in-band network management provides better security than an out-of-band approach. Before we get into too much detail we need to discuss what an out-of-band and an in-band network management approach are. In-band approaches require devices or hardware to sit in the flow of live network traffic, often where endpoints access the network so that all client traffic has to pass through them. When a network manager decides to deploy an in-band device then they will be able to provide pre-connect and post-connect security. Network adapters are the most common type of in-band remote management hardware devices (Nevis Networks, 2007). In a Windows environment you can use remote access connections to manage......

Words: 1099 - Pages: 5

Premium Essay

Online Social Network Paper

...Online Social Networking Paper Name SOC/100 Date Instructor Name Online Social Networking Paper Social websites have become a large part of everyday life for many, and none looms larger than Facebook. A social network with 1.11 billion monthly users, and 655 million daily active users ("Iamwire", 2013), Facebook, at its very basic core offers the ability to communicate with others from all over the world. What is communicated, and to whom is entirely up to the user. Some choose to update friends and family on happenings in their lives, while others take a more passive approach and use the site to simply stay in touch with loved ones. Videos, pictures, and music can be shared on Facebook, and as a result has been a key promotional tool for companies looking to sell their products. Official pages have been created for films, artists, food chains, and various other services as a way to spread word of new promotions, as well as communicate directly to consumers. Some of the team’s experiences were initially consumed by Facebook. The ability to find old friends, update others with our own happenings, and catch up with former classmates and co-workers was hard to resist. However, that rush faded and their participation went from active to passive rather quickly. One observation of the website contends with an image of astonishing happiness than to really form deep relationships. A revelation that sees little middle ground between those who share too much, and others who do......

Words: 1642 - Pages: 7

Free Essay

Unit 6 Research Paper 1: Network Attached Storage

...Unit 6 Research Paper 1: Network Attached Storage What is a NAS device? A NAS (Network Attached Storage) device is a server that is solely dedicated to file sharing. NAS does not provide typical activities like e-mail, authentication or file management. NAS permits more hard disk storage space to be added to a network that already operates short of shutting them down for maintenance and upgrades. NAS can be anywhere in a LAN it does not have to be positioned within the server and can be made up of several network devices. What is the speed of the network adapter available on a NAS device? NAS devices come in many variations and depending on purchased one or built one yourself. Usual speed is one gigabit Ethernet connection however it can be changed to several gigabit, 10 gigabit fiber optic by adding a pci-e network card(s). What is the capacity range? This capacity range also varies; you could build a 2 TB machine or a 40 TB machine. With port replication and add on hard dive controller cards there is barely a boundary on size. Is there any fault tolerance (such as RAID) built into a NAS device? Raid 50 is pretty stable if set up properly, raid 10 has been said to be one of the best because more drives can fail at once without data loss. Are management features available? Depending on the type of NAS device, Most are web interface. Cite: IT Business Edge, Property of Quinstreet Enterprise Copyright 2014 Quinstreet Inc. Toms Hardware Copyright 2014 A...

Words: 264 - Pages: 2

Free Essay

Network Security Research Paper

...If you have any feedback on my paper please let me know. I would appreciate any and all forms of feedback, constructive is always the best kind. About FIRST. (2015, January 1). Retrieved from http://www.first.org/about Beal, V. (n.d.). Trojan Horse. Retrieved from http://www.webopedia.com/TERM/T/Trojan_horse.html Fisher, T. (n.d.). Bandwidth. Retrieved from http://pcsupport.about.com/od/termsb/g/bandwidth.htm Internet History. (n.d.). Retrieved from http://www.softheap.com/internet/internet-history.html Kay, R. (2003, July 13). Buffer Overflow. Retrieved from http://www.computerworld.com/article/2572130/security0/buffer-overflow.html Lynn, S. (2014, March 27). RAID Levels Explained. Retrieved from http://www.pcmag.com/article2/0,2817,2370235,00.asp Rouse, M. (2005, September 1). Security token (authentication token). Retrieved from http://searchsecurity.techtarget.com/definition/security-token Rouse, M. (2014, November 14). Confidentiality, integrity, and availability (CIA triad). Retrieved from http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA RSA Secure ID. (n.d.). Retrieved from http://www.webopedia.com/TERM/R/rsa_secure_id.html Crump, G. (2013, September 13). Cloud Backup Vs. Tape: Think Hybrid. Retrieved from http://www.informationweek.com/cloud-backup-vs-tape-think-hybrid/d/d-id/1111524 Rupert, J. (2013, August 23). The Relationship Between the Business Impact Analysis and Risk Assessment. Retrieved from......

Words: 355 - Pages: 2

Premium Essay

Home Network Paper

...Home network paper Introduction The paper gives a clear description of my home network diagram. This home network has a high speed internet connection from Comcast Internet Service Provider (ISP) connected via Category 5e coax cable to the cable modem Cisco DPC 3008, which is connected to the wireless router Cisco Linksys E900 by using Ethernet cable. Work laptop and TV are connected to the wireless router via Ethernet cable. In this home, wireless router provides wireless as well as physical cable ports for various devices like laptops, smart phones, iPad, and printer. Home Network The home network has a single floor that contains cable modem, wireless router, laptops, printer, television, iPad, iPhone, and cables. The network diagram attached below shows the connection between all these devices with wired and wireless networks. Home Wired and Wireless (Mixed) Network Diagram for all devices. Above network diagram shows the wired and wireless connection of devices in the home. This home getting the internet from Comcast internet service provider through Category 5e coax cable to the Cisco DPC3008 cable modem. Ethernet cable is using to connect modem and wireless router and also to connect laptops and television for wired network. Network diagram shows the wired connection for television for better streaming. Sometimes, wired connection is used for one of the laptop for heavy jobs. Smart phones, iPad, and laptop are using the wireless network. For this home,......

Words: 783 - Pages: 4

Premium Essay

Cis: Network Design Paper

...Network Consultation Introduction to Networking June 19, 2016 Network Design DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance. I recommend using a Local Area Network (LAN) design to efficiently fulfill this request. According to Agarwal & Tayal (2009), “The main reason for designing a LAN is to share resources such as disks, printers, programs, and data. It also enables the exchange of information.” Using a server based LAN, DesignIT can manage its six computers through by accessing the main computer from the three servers which can be located in the server room as indicated on the design layout. There are several advantages of LAN such as: * It allows for a large number of users to access data from a single memory. * Files are stored on single memory. * The processing can be done by numerous of users simultaneously. * Low cost. * Resource sharing. * Every device can communicate with any other device. * Independent devices are interconnected with high degree Compared to other area networks, the LAN is ideal for being used in a small area such as an office building. LAN has the lowest error rates, highest speed in transmission and uses the most inexpensive equipment such as Ethernet and token rings. Network Architecture DesignIT is a small business that is expanding and requires additional workstations. As the company continues to grow, there is a natural......

Words: 1188 - Pages: 5

Premium Essay

Bead Bar Network Paper

...increase. When developing the Bead Bar’s network plan there are multiple issues that need to be taken into consideration before a network topology and architecture can be established. Number of computers that need to be linked to the network, number of expected users on the network, cost effectiveness, ability to expand the network, these are just a few of the questions that need to be addressed. Even after these topics have been visited; it is important that the network plan not become stagnant. It should be revisited and modified, even as it is being implemented, to assure the most efficient network is being installed for the company’s current and future needs. We have previously established that the Bead Bar has about 35 full and part-time employees. There are six studios and five franchises scattered across multiple states that will need to be connected to the network. In addition there is Bead Bar on Board that will need the ability to remotely access the network. The hardware specifications have not yet been finalized, but we can anticipate connecting at least 14 computers, and around seven or eight printers to the network. The good news is all of the computers will be PCs running on Windows XP Pro; which is both a computer operating system (OS) as well as a network operating system (NOS), so no additional NOS software will be required (Malaga, 2005). Once the hardware requirements, topology, architecture, and implementation of the network have been ascertained;......

Words: 1142 - Pages: 5